ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • Best Practices for Healthcare Data Breach Prevention

    Sponsored by: Absolute

    As healthcare records grow in value and popularity in underground markets, it's more important than ever to have airtight data protection and breach prevention protocols in place to keep patients' information safe. Whether you're in healthcare or another industry, learn how to keep information secure with data breach protection best practices.

  • How to Identity Web Threats in Real-Time

    Sponsored by: Symantec & Blue Coat Systems

    Discover how you can achieve real-time web protection and dynamic malware scanning in your existing security infrastructure. Learn how you can quickly enforce network access policies, instantly report on web threats and user activity, and more.

  • Secure and Accelerate User Access to Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.

  • Deliver Complete Security for Enterprise Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.

  • A New Trend in Agile - Incorporating Program Management

    Sponsored by: Global Knowledge

    How can organizations in diverse industries continue to use familiar waterfall practices and at the same time be more Agile? The answer is to use Agile program management - learn more about these principles inside.

  • Firewall Clean Up Recommendations

    Sponsored by: FireMon

    At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.

  • Turning Data Protection into a Game Changer for MSPs

    Sponsored by: Solarwinds MSP

    MSPs are forced to move at the pace dictated by cybercriminals, rapid. Learn how to not only manage customers' hardware and software but also their data. Uncover how to protect customer's confidential or regulated data, manage their vulnerabilities and demonstrate the value of these activities in easy to understand formats.

  • Designing an IAM Program Optimized for Your Business

    Sponsored by: IBM

    A recent IBM report found that insiders were responsible for 60% of attacks. With evidence like that, it's time to revamp your IAM strategy. In this white paper, discover a 4-step process to maturing your IAM policies to ensure that business objectives related to security, productivity and compliance can be met.

  • Buyers guide to cloud based I&M mgmt

    Sponsored by: IBM

    Learn how to make the most informed decision about your next enterprise grade IDaaS provider with this interactive buyer's guide.

  • The Current State of Data Protection in Midsize Organizations

    Sponsored by: arcserve

    Discover why and how IT security strategies are evolving from the survey results of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsized organizations.

  • Reasonable Security Best Practices: Learning From Notable Data Breaches

    Sponsored by: Global Knowledge

    Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?

  • Comparing Data Protection and Information Management Vendors

    Sponsored by: Commvault

    Uncover a comparison of two data protection and information management vendors (Veeam and Commvault). Learn how they compare on 5 important factors that you should be considering when looking to purchase data protection and information management.

  • Threat management: Essential guide

    Sponsored by: ComputerWeekly.com

    Security is about reducing risk, while assessing risk is all about understanding the cyber threats facing the enterprise, which in turn is about recognising that not all threats are external and that threat intelligence is a key element of threat management.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • From Reactive to Proactive: How to Avoid Alert Fatigue

    Sponsored by: ThreatConnect

    Learn how to prioritize security alerts and reduce alert fatigue. Discover how to achieve active response, allowing you to respond to attacks as quickly as they are detected.

  • Computer Weekly: Data Danger

    Sponsored by: ComputerWeekly.com

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

  • Best Practices for Dealing With Phishing and Ransomware

    Sponsored by: KnowBe4

    This Osterman Research white paper focuses on current problems in security with phishing and ransomware, and gives recommendations on how to mitigate these threats. Learn how to implement security awareness training for all users, maintain quality backups and implement detection and elimination systems for your network.

  • How to Transform Employee Worst Practices Into Enterprise Best Practices

    Sponsored by: KnowBe4

    Learn 10 best practices that contribute to an effective security awareness training program, and 4 worst practices that can detract from it. Get a clear direction on how to improve your organization's security posture and establish a human firewall to effectively block all manners of cyberattacks.

  • The Phishing Breakthrough Point

    Sponsored by: KnowBe4

    Habits take time to form and become part of one's daily life – the same applies to being cyber street-smart about phishing prevention. Learn how to create a more effective phishing awareness training program through deeper analysis of the human landscape of your organization.

  • Employees at the Frontline in the Battle Against Ransomware

    Sponsored by: KnowBe4

    In crunch time, it's all up to your employees to defend your critical information. Enable them to protect your organization sufficiently with proper security training and education in place. With well-trained personnel on the frontlines, you can ensure your organization stays safe from the crippling effects of ransomware.

  • Resource Center: Stop Threats and Prevent Data Loss

    Sponsored by: Intel Security

    Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.

  • Resource Center: How to Safeguard Data

    Sponsored by: Intel Security

    This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.

  • Mitigate Security Risks with Hyperconverged Infrastructure

    Sponsored by: SimpliVity

    Improve your security posture and best mitigate risks by implementing comprehensive security measures across your entire enterprise - from the network perimeter to the application layer. Discover how a hyperconverged infrastructure limits potential points of attack and consolidates security controls.

  • SIEM Analysis Interfaces for Security Professionals

    Sponsored by: LogRhythm, Inc.

    This expert e-guide explains how you can avoid SIEM errors by implementing an analysis interface in your SIEM system to ease assessment and interpretation tasks for security professionals.

  • Dynamic Security Management for a Productive Mobile Workforce

    Sponsored by: RES Software

    This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.